Solved

DOS Command line for PGP??

Posted on 2007-04-01
5
706 Views
Last Modified: 2011-10-03
Which version of PGP  is compatible for DOS command line.
Please provide an example of command to encrypt and sign using PGP command line.

Is it possible to Encrypt and sign 500 files through a batch program, each of this files' will be Encrypted using a different Public key.
0
Comment
Question by:mkhan900
  • 2
5 Comments
 
LVL 27

Expert Comment

by:Tolomir
ID: 18834525
Take a look at:

http://www.pgp.com/products/commandline/index.html

    * Easily integrate information security into existing automation scripts and backup systems.
    * Ensure confidential information is protected by strong encryption no matter where it resides.
    * Leverage existing infrastructure and work with business partners with support for OpenPGP keys, X.509 certificates, PGP Universal Server, and PGP keyservers.
    * Retain corporate recovery and access to encrypted data (according to policy) using patented PGP Additional Decryption Key (ADK) technology when a key is lost or when required by regulatory mandates.

Tolomir
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 18834541
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 19153848
PAQed with no points refunded (of 125)

Computer101
EE Admin
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this era, as you know, cybercrime and other sorts of frauds using the internet has increased day by day. We should protect our information assets and confidential information from getting exploiting by the attacker or intruders. Most of the fraud…
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question